posted by system || 5165 views || tracked by 9 users: [display]

STM 2009 : 5th International Workshop on Security and Trust Management

FacebookTwitterLinkedInGoogle


Conference Series : Security and Trust Management
 
Link: http://stm09.dti.unimi.it
 
When Sep 24, 2009 - Sep 25, 2009
Where Saint Malo, France
Submission Deadline Jun 21, 2009
Notification Due Jul 27, 2009
Final Version Due Aug 17, 2009
Categories    security
 

Call For Papers

STM (Security and Trust Management) is a working group of ERCIM (European Research Consortium in Informatics and Mathematics). STM 2009 is the fifth workshop in this series and will be held in Saint Malo, France, in conjunction with ESORICS 2009 (14th European Symposium on Research in Computer Security). STM has the following aims:

* to investigate the foundations and applications of security and trust in ICT;
* to study the deep interplay between trust management and common security issues such as confidentiality, integrity, and availability;
* to identify and promote new areas of research connected with security management (e.g. dynamic and mobile coalition management, P2P, MANETs, Web/GRID services);
* to identify and promote new areas of research connected with trust management (e.g., reputation, recommendation, and collaboration);
* to provide a platform for presenting and discussing emerging ideas and trends.

Topics of interest include, but are not limited to:

access control reputation systems and architectures
cryptography security and trust management architectures
data protection semantics and computational models for security and trust
digital right management trust assessment and negotiation
economics of security and privacy trust in mobile code
key management trust in pervasive environments
ICT for securing digital as well as physical assets trust models
identity management trust management policies
networked systems security trusted platforms and trustworthy systems
privacy and anonymity trustworthy user devices


The primary focus is on high-quality original unpublished research, case studies, and implementation experiences. We encourage submissions discussing the application and deployment of security technologies in practice.

Paper Submissions
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 12 pages in ENTCS style format (using the generic template), including the bibliography and well-marked appendices. Committee members are not required to read the appendices, and so the paper should be intelligible without them. Submissions are to be made to the submission web site (to be announced). Only pdf files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Papers must be received by the deadline of June 21, 2009. Authors of accepted papers must guarantee that their papers will be presented at the workshop. Accepted papers will be published in a post-workshop ENTCS volume.


General Chair
Christian Jensen
Technical University of Denmark, Denmark
www2.imm.dtu.dk/~cdj/


Program Chairs
Sabrina De Capitani di Vimercati Ralf Küsters
Università degli Studi di Milano University of Trier, Germany
www.dti.unimi.it/decapita www.infsec.uni-trier.de/people/kuesters.html


Publication Chair
Claudio A. Ardagna
Università degli Studi di Milano, Italy


Publicity Chair
Eros Pedrini
Università degli Studi di Milano, Italy


Important dates
Paper Submission due: June 21, 2009
Notification to authors: July 27, 2009
Camera ready due: August 17, 2009


Program Committee (to be completed)
Mikhail Atallah Purdue University, USA
Vijay Atluri Rutgers University, USA
Karthik Bhargavan Microsoft Research laboratory, UK
Iliano Cervesato Carnegie Mellon University, Qatar
Cas Cremers ETH Zurich, Switzerland
Theo Dimitrakos BT, UK
Simone Fischer-Huebner Karlstad University, Sweden
Sara Foresti Università degli Studi di Milano, Italy
Michael Huth Imperial College London, UK
Sushil Jajodia George Mason University, USA
Volkmar Lotz SAP Research, France
Peng Liu Pennsylvania State University, USA
Javier Lopez University of Malaga, Spain
Sjouke Mauw University of Luxembourg, Luxembourg
Fabio Martinelli CNR, Italy
Carlos Maziero PUCPR, Brasil
Catherine Meadows NRL, USA
John Mitchell Stanford University, USA
Chris Mitchell Royal Holloway, University of London, UK
Olivier Pereira UCL, Belgium
Peter Ryan University of of Luxembourg, Luxembourg
Mark Ryan University of Birmingham, UK
Michael Rusinowitch INRIA, France
Pierangela Samarati Università degli Studi di Milano, Italy
Damien Sauveron XLIM, University of Limoges, France
Joerg Schwenk Ruhr-Universitat Bochum, Germany
Ron van der Meyden University of New South Wales, Australia
Luca Viganò Università di Verona, Italy
Bogdan Warinschi University of Bristol, UK


Important dates
Paper Submission due: June 21, 2009
Notification to authors: July 27, 2009
Camera ready due: August 17, 2009


For any questions, please contact the program chairs: stm09@infsec.uni-trier.de

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
ECTIJ 2024   Economics, Commerce and Trade Management: An International Journal
S&P 2025   The 45th IEEE Symposium on Security and Privacy